Boot Integrity

Use secure methods to boot a system and verify the integrity of the operating system and loading mechanisms.

ID: M1046
Version: 1.0
Created: 11 June 2019
Last Modified: 19 May 2020

Techniques Addressed by Mitigation

Domain ID Name Use
Enterprise T1195 供应链破坏

Use secure methods to boot a system and verify the integrity of the operating system and loading mechanisms.

.003 Compromise Hardware Supply Chain

Use Trusted Platform Module technology and a secure or trusted boot process to prevent system integrity from being compromised. Check the integrity of the existing BIOS or EFI to determine if it is vulnerable to modification. [1] [2]

Enterprise T1601 修改系统镜像

Some vendors of embedded network devices provide cryptographic signing to ensure the integrity of operating system images at boot time. Implement where available, following vendor guidelines. [3]

.001 Patch System Image

Some vendors of embedded network devices provide cryptographic signing to ensure the integrity of operating system images at boot time. Implement where available, following vendor guidelines. [3]

.002 Downgrade System Image

Some vendors of embedded network devices provide cryptographic signing to ensure the integrity of operating system images at boot time. Implement where available, following vendor guidelines. [3]

Enterprise T1495 固件篡改

Check the integrity of the existing BIOS and device firmware to determine if it is vulnerable to modification.

Enterprise T1542 预操作系统引导

Use Trusted Platform Module technology and a secure or trusted boot process to prevent system integrity from being compromised. Check the integrity of the existing BIOS or EFI to determine if it is vulnerable to modification. [1] [2]

.001 System Firmware

Check the integrity of the existing BIOS or EFI to determine if it is vulnerable to modification. Use Trusted Platform Module technology. [1] Move system's root of trust to hardware to prevent tampering with the SPI flash memory.[4] Technologies such as Intel Boot Guard can assist with this. [5]

.003 Bootkit

Use Trusted Platform Module technology and a secure or trusted boot process to prevent system integrity from being compromised. [1] [2]

.004 ROMMONkit

Enable secure boot features to validate the digital signature of the boot environment and system image using a special purpose hardware device. If the validation check fails, the device will fail to boot preventing loading of unauthorized software. [3]

.005 TFTP Boot

Enable secure boot features to validate the digital signature of the boot environment and system image using a special purpose hardware device. If the validation check fails, the device will fail to boot preventing loading of unauthorized software. [3]

Enterprise T1553 .006 颠覆信任控制: Code Signing Policy Modification

Use of Secure Boot may prevent some implementations of modification to code signing policies.[6]

References